Analysis
-
max time kernel
70s -
max time network
74s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2023, 20:40
Static task
static1
Behavioral task
behavioral1
Sample
Vega X/Vega X.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Vega X/Vega X.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
Vega X/bin/FluxInteractions.dll
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
Vega X/bin/FluxInteractions.dll
Resource
win10v2004-20230915-en
General
-
Target
Vega X/bin/FluxInteractions.dll
-
Size
6.2MB
-
MD5
cdf73079a63074805810016f13fbbfce
-
SHA1
f7ecbbd392820ea6fb8cbc72911325c440c0c271
-
SHA256
c1eb4052b0a9d672595be10d21ff60a79039c5842d8c98e837251a721549c60b
-
SHA512
2eb5a41dfe01d6b58aba5d27a4b359f8b6ea2b913e465ca839f09b3c334aabe550d4925a6e786540a5c28c9086ed97b2187722f3bf62c54ae92922550f5e36e9
-
SSDEEP
98304:ff0ldnefVuuvtLonWJ7gatg6QrkP6G9qvPpZDI0evx+AquS/gdV7Wme+OEDl:kH6tvP613pZkvquddNLhOW
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3920 rundll32.exe 3920 rundll32.exe 3920 rundll32.exe 3920 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5076 wrote to memory of 3920 5076 rundll32.exe 85 PID 5076 wrote to memory of 3920 5076 rundll32.exe 85 PID 5076 wrote to memory of 3920 5076 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\Vega X\bin\FluxInteractions.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\Vega X\bin\FluxInteractions.dll",#12⤵
- Suspicious behavior: EnumeratesProcesses
PID:3920
-